What You Need to Know Before
You Start

Starts 4 July 2025 21:09

Ends 4 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

World-leaders in Cryptography - Srini Devadas

Join MIT Professor Srini Devadas as he delves into the world of applied cryptography, computer security, and architecture. Known for his groundbreaking work, Professor Devadas has invented Physical Unclonable Functions (PUFs) and spearheaded secure processor designs, shaping the future of secure computing. This event, brought to you on YouTu.
Bill Buchanan OBE via YouTube

Bill Buchanan OBE

2777 Courses


1 hour 31 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Video

Optional upgrade avallable

Overview

Join MIT Professor Srini Devadas as he delves into the world of applied cryptography, computer security, and architecture. Known for his groundbreaking work, Professor Devadas has invented Physical Unclonable Functions (PUFs) and spearheaded secure processor designs, shaping the future of secure computing.

This event, brought to you on YouTube, opens the door to the insights and innovations of one of the leading figures in cryptography today.

Ideal for enthusiasts and professionals in artificial intelligence and computer science, this session offers a unique opportunity to learn from a pioneer in the field.

Syllabus

  • Course Introduction
  • Overview of Applied Cryptography
    Introduction to Professor Srini Devadas and Key Contributions
  • Basics of Cryptography
  • Fundamental Cryptographic Principles
    Symmetric and Asymmetric Cryptography
    Hash Functions and Digital Signatures
  • Physical Unclonable Functions (PUFs)
  • Definition and Characteristics of PUFs
    Applications of PUFs in Security
    Design and Implementation Challenges
  • Secure Processor Designs
  • Architecture of Secure Processors
    Role in Data Protection and Privacy
    Case Studies: Secure Processor Designs by Professor Devadas
  • Advanced Cryptographic Techniques
  • Homomorphic Encryption
    Post-Quantum Cryptography
    Blockchain Technology and Cryptographic Applications
  • Computer Security Landscape
  • Threat Models and Security Attacks
    Security Protocols and Best Practices
    Cryptography in Internet Security
  • Applied Cryptography Case Studies
  • Real-world Applications and Innovations
    Case Study: MIT Research and Development Initiatives
  • Current Trends and Future Directions
  • Emerging Cryptographic Technologies
    The Role of Cryptography in AI and Machine Learning
    Future Challenges in Cryptography
  • Final Project and Course Review
  • Project: Cryptographic Implementation or Research
    Review and Discussion of Key Learnings
    Feedback and Evaluation

Subjects

Computer Science